DarkSide ransomware analysis
This blog post will try to explain how the ransomware called DarkSide works. Based on my research, this ransomware uses Salsa20 encryption to encrypt files a...
This blog post will try to explain how the ransomware called DarkSide works. Based on my research, this ransomware uses Salsa20 encryption to encrypt files a...
Instead of attacking companies to deploy ransomware, the thread actors behind the Exorcist 2.0 ransomware are using a different way of attacking companies.
I am assuming you are already familiar with Docker. What most of the people do when using official Docker images is pull the image, install some stuff and l...
In this blog post I would like to explain how to analyze files using Ghidra and x64dbg while using the ret-sync plugin. While analyzing malware it is importa...
This blog post will explain the workings of the ransomware named Wasted Locker based on 3 different samples. Last weeks I read a lot of articles about compan...